diff --git a/2022/0xxx/CVE-2022-0219.json b/2022/0xxx/CVE-2022-0219.json new file mode 100644 index 00000000000..ab3ce090cc6 --- /dev/null +++ b/2022/0xxx/CVE-2022-0219.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0219", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0220.json b/2022/0xxx/CVE-2022-0220.json new file mode 100644 index 00000000000..a400622bbb3 --- /dev/null +++ b/2022/0xxx/CVE-2022-0220.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0220", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0221.json b/2022/0xxx/CVE-2022-0221.json new file mode 100644 index 00000000000..898a8bb55bf --- /dev/null +++ b/2022/0xxx/CVE-2022-0221.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0221", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0222.json b/2022/0xxx/CVE-2022-0222.json new file mode 100644 index 00000000000..5af296b6e46 --- /dev/null +++ b/2022/0xxx/CVE-2022-0222.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0222", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0223.json b/2022/0xxx/CVE-2022-0223.json new file mode 100644 index 00000000000..7ca32e2d264 --- /dev/null +++ b/2022/0xxx/CVE-2022-0223.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0223", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/22xxx/CVE-2022-22122.json b/2022/22xxx/CVE-2022-22122.json index f65b15900fe..ea24a97c4d2 100644 --- a/2022/22xxx/CVE-2022-22122.json +++ b/2022/22xxx/CVE-2022-22122.json @@ -96,7 +96,7 @@ "description_data": [ { "lang": "eng", - "value": "In Mattermost Focalboard, versions prior to v0.7.5, v0.8.4, v0.9.5, v0.10.1 and v0.11.0-rc1; as used respectively in Mattermost, versions prior to v5.37.6, v5.39.3, v6.0.4, v6.1.1 and v6.2.0, are vulnerable to Insufficient Session Expiration. When a user initiates a logout, their session is not invalidated properly. In addition, user sessions are stored in the browser’s local storage, which by default does not have an expiration time. This makes it possible for an attacker to steal and reuse the cookies using techniques such as XSS attacks, to completely take over a victim account." + "value": "In Mattermost Focalboard, versions prior to v0.7.5, v0.8.4, v0.9.5, v0.10.1 and v0.11.0-rc1; as used respectively in Mattermost, versions prior to v5.37.6, v5.39.3, v6.0.4, v6.1.1 and v6.2.0, are vulnerable to Insufficient Session Expiration. When a user initiates a logout, their session is not invalidated properly. In addition, user sessions are stored in the browser\u2019s local storage, which by default does not have an expiration time. This makes it possible for an attacker to steal and reuse the cookies using techniques such as XSS attacks, to completely take over a victim account." } ] }, @@ -135,51 +135,63 @@ "reference_data": [ { "refsource": "MISC", - "url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22122" + "url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22122", + "name": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22122" }, { - "refsource": "CONFIRM", - "url": "https://github.com/mattermost/focalboard/commit/2f08c6782762e58e008bd50f3892cb1cdd1be539" + "refsource": "MISC", + "url": "https://github.com/mattermost/focalboard/commit/2f08c6782762e58e008bd50f3892cb1cdd1be539", + "name": "https://github.com/mattermost/focalboard/commit/2f08c6782762e58e008bd50f3892cb1cdd1be539" }, { - "refsource": "CONFIRM", - "url": "https://github.com/mattermost/focalboard/commit/0ebc9a4be110764a2510bf886531f21e21b079ea" + "refsource": "MISC", + "url": "https://github.com/mattermost/focalboard/commit/0ebc9a4be110764a2510bf886531f21e21b079ea", + "name": "https://github.com/mattermost/focalboard/commit/0ebc9a4be110764a2510bf886531f21e21b079ea" }, { - "refsource": "CONFIRM", - "url": "https://github.com/mattermost/focalboard/commit/6104de5ba51f79d749b9d5406fde5c2983fc5c5c" + "refsource": "MISC", + "url": "https://github.com/mattermost/focalboard/commit/6104de5ba51f79d749b9d5406fde5c2983fc5c5c", + "name": "https://github.com/mattermost/focalboard/commit/6104de5ba51f79d749b9d5406fde5c2983fc5c5c" }, { - "refsource": "CONFIRM", - "url": "https://github.com/mattermost/focalboard/commit/87f4dd224c8736778a8f23788a92471b11da9061" + "refsource": "MISC", + "url": "https://github.com/mattermost/focalboard/commit/87f4dd224c8736778a8f23788a92471b11da9061", + "name": "https://github.com/mattermost/focalboard/commit/87f4dd224c8736778a8f23788a92471b11da9061" }, { - "refsource": "CONFIRM", - "url": "https://github.com/mattermost/focalboard/commit/a2fab2c1d9b3f61871f6da4dc434a2b19ca9552c" + "refsource": "MISC", + "url": "https://github.com/mattermost/focalboard/commit/a2fab2c1d9b3f61871f6da4dc434a2b19ca9552c", + "name": "https://github.com/mattermost/focalboard/commit/a2fab2c1d9b3f61871f6da4dc434a2b19ca9552c" }, { - "refsource": "CONFIRM", - "url": "https://github.com/mattermost/focalboard/commit/0142c114e9325722d6c8e8ca00f10f0f34dd0409" + "refsource": "MISC", + "url": "https://github.com/mattermost/focalboard/commit/0142c114e9325722d6c8e8ca00f10f0f34dd0409", + "name": "https://github.com/mattermost/focalboard/commit/0142c114e9325722d6c8e8ca00f10f0f34dd0409" }, { - "refsource": "CONFIRM", - "url": "https://github.com/mattermost/mattermost-server/commit/0a042ca05fefa0584045bab1b7dae102360c98c5" + "refsource": "MISC", + "url": "https://github.com/mattermost/mattermost-server/commit/0a042ca05fefa0584045bab1b7dae102360c98c5", + "name": "https://github.com/mattermost/mattermost-server/commit/0a042ca05fefa0584045bab1b7dae102360c98c5" }, { - "refsource": "CONFIRM", - "url": "https://github.com/mattermost/mattermost-server/commit/7bc182de9eebb708d62b828213144a1aa4560fa0" + "refsource": "MISC", + "url": "https://github.com/mattermost/mattermost-server/commit/7bc182de9eebb708d62b828213144a1aa4560fa0", + "name": "https://github.com/mattermost/mattermost-server/commit/7bc182de9eebb708d62b828213144a1aa4560fa0" }, { - "refsource": "CONFIRM", - "url": "https://github.com/mattermost/mattermost-server/commit/74e87ec3e623202a9654ae164e834cfe26dd6ec3" + "refsource": "MISC", + "url": "https://github.com/mattermost/mattermost-server/commit/74e87ec3e623202a9654ae164e834cfe26dd6ec3", + "name": "https://github.com/mattermost/mattermost-server/commit/74e87ec3e623202a9654ae164e834cfe26dd6ec3" }, { - "refsource": "CONFIRM", - "url": "https://github.com/mattermost/mattermost-server/commit/5f7fd34956ad5bf7e3697a920e377e11c16dda06" + "refsource": "MISC", + "url": "https://github.com/mattermost/mattermost-server/commit/5f7fd34956ad5bf7e3697a920e377e11c16dda06", + "name": "https://github.com/mattermost/mattermost-server/commit/5f7fd34956ad5bf7e3697a920e377e11c16dda06" }, { - "refsource": "CONFIRM", - "url": "https://github.com/mattermost/mattermost-server/commit/6a4c881450973284c3ed98f39bde4809ddd8a758" + "refsource": "MISC", + "url": "https://github.com/mattermost/mattermost-server/commit/6a4c881450973284c3ed98f39bde4809ddd8a758", + "name": "https://github.com/mattermost/mattermost-server/commit/6a4c881450973284c3ed98f39bde4809ddd8a758" } ] }, @@ -193,4 +205,4 @@ "advisory": "https://www.whitesourcesoftware.com/vulnerability-database/", "discovery": "UNKNOWN" } -} +} \ No newline at end of file diff --git a/2022/22xxx/CVE-2022-22123.json b/2022/22xxx/CVE-2022-22123.json index 6380b4e9062..48b90b1318f 100644 --- a/2022/22xxx/CVE-2022-22123.json +++ b/2022/22xxx/CVE-2022-22123.json @@ -51,7 +51,7 @@ "description_data": [ { "lang": "eng", - "value": "In Halo, versions v1.0.0 to v1.4.17 (latest) are vulnerable to Stored Cross-Site Scripting (XSS) in the article title. An authenticated attacker can inject arbitrary javascript code that will execute on a victim’s server." + "value": "In Halo, versions v1.0.0 to v1.4.17 (latest) are vulnerable to Stored Cross-Site Scripting (XSS) in the article title. An authenticated attacker can inject arbitrary javascript code that will execute on a victim\u2019s server." } ] }, @@ -89,16 +89,19 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://github.com/halo-dev/halo/blob/v1.4.17/src/main/java/run/halo/app/service/impl/PostServiceImpl.java#L391" + "refsource": "MISC", + "url": "https://github.com/halo-dev/halo/blob/v1.4.17/src/main/java/run/halo/app/service/impl/PostServiceImpl.java#L391", + "name": "https://github.com/halo-dev/halo/blob/v1.4.17/src/main/java/run/halo/app/service/impl/PostServiceImpl.java#L391" }, { "refsource": "MISC", - "url": "https://github.com/halo-dev/halo/issues/1557" + "url": "https://github.com/halo-dev/halo/issues/1557", + "name": "https://github.com/halo-dev/halo/issues/1557" }, { "refsource": "MISC", - "url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22123" + "url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22123", + "name": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22123" } ] }, @@ -106,4 +109,4 @@ "advisory": "https://www.whitesourcesoftware.com/vulnerability-database/", "discovery": "UNKNOWN" } -} +} \ No newline at end of file diff --git a/2022/22xxx/CVE-2022-22124.json b/2022/22xxx/CVE-2022-22124.json index 4d7b6eb2079..152d18cba51 100644 --- a/2022/22xxx/CVE-2022-22124.json +++ b/2022/22xxx/CVE-2022-22124.json @@ -51,7 +51,7 @@ "description_data": [ { "lang": "eng", - "value": "In Halo, versions v1.0.0 to v1.4.17 (latest) are vulnerable to Stored Cross-Site Scripting (XSS) in the profile image. An authenticated attacker can upload a carefully crafted SVG file that will trigger arbitrary javascript to run on a victim’s browser." + "value": "In Halo, versions v1.0.0 to v1.4.17 (latest) are vulnerable to Stored Cross-Site Scripting (XSS) in the profile image. An authenticated attacker can upload a carefully crafted SVG file that will trigger arbitrary javascript to run on a victim\u2019s browser." } ] }, @@ -89,16 +89,19 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://github.com/halo-dev/halo/blob/v1.4.17/src/main/java/run/halo/app/handler/file/FileHandler.java#L30" + "refsource": "MISC", + "url": "https://github.com/halo-dev/halo/blob/v1.4.17/src/main/java/run/halo/app/handler/file/FileHandler.java#L30", + "name": "https://github.com/halo-dev/halo/blob/v1.4.17/src/main/java/run/halo/app/handler/file/FileHandler.java#L30" }, { "refsource": "MISC", - "url": "https://github.com/halo-dev/halo/issues/1575" + "url": "https://github.com/halo-dev/halo/issues/1575", + "name": "https://github.com/halo-dev/halo/issues/1575" }, { "refsource": "MISC", - "url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22124" + "url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22124", + "name": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22124" } ] }, @@ -106,4 +109,4 @@ "advisory": "https://www.whitesourcesoftware.com/vulnerability-database/", "discovery": "UNKNOWN" } -} +} \ No newline at end of file diff --git a/2022/22xxx/CVE-2022-22125.json b/2022/22xxx/CVE-2022-22125.json index f47d277abfc..4d5ade2b884 100644 --- a/2022/22xxx/CVE-2022-22125.json +++ b/2022/22xxx/CVE-2022-22125.json @@ -51,7 +51,7 @@ "description_data": [ { "lang": "eng", - "value": "In Halo, versions v1.0.0 to v1.4.17 (latest) are vulnerable to Stored Cross-Site Scripting (XSS) in the article tag. An authenticated admin attacker can inject arbitrary javascript code that will execute on a victim’s server." + "value": "In Halo, versions v1.0.0 to v1.4.17 (latest) are vulnerable to Stored Cross-Site Scripting (XSS) in the article tag. An authenticated admin attacker can inject arbitrary javascript code that will execute on a victim\u2019s server." } ] }, @@ -89,16 +89,19 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://github.com/halo-dev/halo/blob/v1.4.17/src/main/java/run/halo/app/service/impl/PostServiceImpl.java#L500" + "refsource": "MISC", + "url": "https://github.com/halo-dev/halo/issues/1557", + "name": "https://github.com/halo-dev/halo/issues/1557" }, { "refsource": "MISC", - "url": "https://github.com/halo-dev/halo/issues/1557" + "url": "https://github.com/halo-dev/halo/blob/v1.4.17/src/main/java/run/halo/app/service/impl/PostServiceImpl.java#L500", + "name": "https://github.com/halo-dev/halo/blob/v1.4.17/src/main/java/run/halo/app/service/impl/PostServiceImpl.java#L500" }, { "refsource": "MISC", - "url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22125" + "url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22125", + "name": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22125" } ] }, @@ -106,4 +109,4 @@ "advisory": "https://www.whitesourcesoftware.com/vulnerability-database/", "discovery": "UNKNOWN" } -} +} \ No newline at end of file